SlideShare une entreprise Scribd logo
1  sur  32
Télécharger pour lire hors ligne
Get Closer to the Cloud with
Federated Single Sign-On
Welcome
Maya Cabassi
Partner Marketing Manager
Amazon Web Services
Webinar Overview
 Submit Your Questions using the Q&A tool.
 A copy of today’s presentation will be made available on:
 AWS SlideShare Channel@ http://www.slideshare.net/AmazonWebServices/
 AWS Webinar Channel on YouTube@ http://www.youtube.com/channel/UCT-
nPlVzJI-ccQXlxjSvJmw
Ben Brauer
Sn. Product Manager
Amazon Web Services
Introducing
Mark Diodati
Technical Dir. Office of the CTO
Ping Identity
 Overview of AWS Identity Access Management (IAM)
 How to deploy Ping Identity Federated Single Sign-
On in AWS
 Q&A
What We’ll Cover
IAM is about Access Control
• One of customers’ top considerations when moving to the cloud
CONTROL
• Why do we want control?
– Appropriate access to do appropriate actions
– I want to implement security best practices
– I want to be at least as secure as on premise
– I must comply with certain industry specific security regulations
IAM Concepts in AWS
• Create and Manage Users and Groups
• Security
– Multiple users, with individual permissions
– Individual security credentials (access keys, password, MFA)
– Secure by default
• Control
– Centralized control of user access
– Fine-grained permissions
– Control Users’ access to APIs and AWS Console
– Cross-account access
• Integrated
– No changes to service APIs
– Federated
Identity Management Concepts
IAM Users: administrators and
consumers of AWS services and
resources
Groups: a collection of IAM
users and policy that applies to
all the IAM users in the group
Examples
Bob can log into the AWS
Management Console to administer
his company’s account
IAM users in the developers group are
allowed to access EC2 instances
tagged with development, but are not
allowed to access instances tagged
with production
Managed Entities
Identity and Access Management
Who has access? What can they do?
IAM Users/Groups Access Policies
Authentication Authorization
What is Identity Federation?
Who has access?
AWS +
Partner Solutions
Within AWS
IAM Users
Identity Management
Solutions
External User
Authentication
Benefits of Identity Federation
• Eliminate managing duplicate user identities
• End users do not need yet another password to
remember
• Leverage your existing investment in identity
management solutions
• Re-use your internal identity management processes
(e.g., password length, rotation, etc…)
Identity Management Concepts in AWS
IAM Users: administrators and consumers
of AWS services and resources
Groups: a collection of IAM users and policy
that applies to all the IAM users in the group
IAM Roles: grants a trusted party
temporary access to your AWS account
Examples
Bob can log into the AWS Management
Console to administer his company’s
account
IAM users in the developers group are
allowed to access EC2 instances tagged
with development, but are not allowed
to access instances tagged with
production
Managed Entities
Grant access to an identity
provider to enable federated
users access to the AWS
Management Console.
Identity Federation Example
Log into the AWS console without a username and password!
Active Directory
AWS AND FEDERATION
Integrating AWS with External Identity Systems
15
IaaS and PaaS need love, too
deployments
number of users
increased IAM needs
deployments users
more administrators
more end-user services
organizational confidence
more services
17
say wha?
federation
is an interoperable technology
provides single sign-on across security
domains
uses security assertion markup language
(SAML)
18
say wha?
federation identity provider (IDP)
authenticates users
gives users SSO (SAML) credentials
redirects users to federation SP
19
say wha?
federation service provider (SP)
accepts user’s SAML credentials
creates user credentials for the local
application
20
federation in action
hosted
on-premises
federation IDP
SaaS application
federation SP
SSO
(SAML)
LDAP
21
use cases
1) AWS IAM as federation SP (new!)
accepts user’s SAML credentials
creates AWS user credentials for access to services
2) federation IDP runs in EC2 instance
authenticates users, gives SAML credentials
3) federation IDP runs in EC2 instance
accepts SAML credentials, creates local credentials
22
federation: interfacing with AWS
default possible
23
Good Ole Days
hosted
on-premises
custom code
storage of IAM user keys
storage of federated user keys
proprietary connectionAmazonAPI
LDAP
(mostly) non-web interaction
24
1) AWS as federation SP
hosted
on-premises
commercial federation IDP
no storage of IAM user keys
no storage of federated user keys
security token service
resides in AWS
SSO
(SAML)
LDAP
(mostly) web interaction
25
AWS federation SAML attributes
Name Description
SAML subject name “uid=tstark,ou=people,o=cloudidentity.com”
Role concatenation of two attributes
• Amazon Resource Name (ARN) of the AWS role with the
entitlements for the federated user
• ARN of the AWS role with entitlements for the identity
provider
“arn:aws:iam::012323142877:role/S3-Users,
arn:aws:iam::012323142877:saml-provider/PING-IDP”
Role Session Name Enables user-specific access policies for the federated user
“tstark”
26
2) EC2 instance with federation IDP
hosted
on-premises
ec2
instance
IDP
application
authentication
partner
27
3) EC2 instance with federation SP
hosted
on-premises
SP
(with
app)
federation IDP
ec2
instance
recommendations
• understand your AWS access requirements
– Non-web access may be a challenge using federation
technology
• don’t use the AWS (superuser) account for the IDP user
– Otherwise, privilege and catastrophe awaits you
• carefully scope the access rights for your roles
– IAM IDP user role
– federated user role
28
29
sample integration
ec2
instance LDAP
A Look Ahead: Cloud Identity Summit
www.cloudidentitysummit.com
30
Jim Scharf: Identity
Management for the Cloud
Ben Brauer: Securing your
AWS Environment
Shon Shah: Delegating
Access to your AWS
Environment
Conor Cahill: Federating
Access to your AWS
Environment
What We’ll Cover
Contacts:
Ping Identity:
https://www.pingidentity.com/
AWS:
aws.amazon.com/contact-us
We appreciate your feedback on this
presentation.
Please take a moment for a quick survey.

Contenu connexe

Tendances

Get your Hybrid Identity in 4 steps with Azure AD Connect
Get your Hybrid Identity in 4 steps with Azure AD ConnectGet your Hybrid Identity in 4 steps with Azure AD Connect
Get your Hybrid Identity in 4 steps with Azure AD Connect
Ronny de Jong
 

Tendances (20)

Windows Azure Active Directory
Windows Azure Active DirectoryWindows Azure Active Directory
Windows Azure Active Directory
 
Azure AD App Proxy Login Scenarios with an On Premises Applications - TSPUG
Azure AD App Proxy Login Scenarios with an On Premises Applications - TSPUGAzure AD App Proxy Login Scenarios with an On Premises Applications - TSPUG
Azure AD App Proxy Login Scenarios with an On Premises Applications - TSPUG
 
Microsoft Azure Identity and O365
Microsoft Azure Identity and O365Microsoft Azure Identity and O365
Microsoft Azure Identity and O365
 
Certifications for Azure Developers
Certifications for Azure DevelopersCertifications for Azure Developers
Certifications for Azure Developers
 
Cognito Customer Deep Dive
Cognito Customer Deep DiveCognito Customer Deep Dive
Cognito Customer Deep Dive
 
AWS reInforce 2021: TDR202 - Lessons learned from the front lines of Incident...
AWS reInforce 2021: TDR202 - Lessons learned from the front lines of Incident...AWS reInforce 2021: TDR202 - Lessons learned from the front lines of Incident...
AWS reInforce 2021: TDR202 - Lessons learned from the front lines of Incident...
 
Microsoft Azure ad in 10 slides
Microsoft Azure ad in 10 slidesMicrosoft Azure ad in 10 slides
Microsoft Azure ad in 10 slides
 
Azure AD Presentation - @ BITPro - Ajay
Azure AD Presentation - @ BITPro - AjayAzure AD Presentation - @ BITPro - Ajay
Azure AD Presentation - @ BITPro - Ajay
 
Microsoft Azure Overview
Microsoft Azure OverviewMicrosoft Azure Overview
Microsoft Azure Overview
 
EWUG - Azure AD Pass-through Authentication and Seamless Single Sign-On
EWUG - Azure AD Pass-through Authentication and Seamless Single Sign-OnEWUG - Azure AD Pass-through Authentication and Seamless Single Sign-On
EWUG - Azure AD Pass-through Authentication and Seamless Single Sign-On
 
Microsoft Reactor Toronto 5/5/2020 | Azure Kubernetes In Action - Running and...
Microsoft Reactor Toronto 5/5/2020 | Azure Kubernetes In Action - Running and...Microsoft Reactor Toronto 5/5/2020 | Azure Kubernetes In Action - Running and...
Microsoft Reactor Toronto 5/5/2020 | Azure Kubernetes In Action - Running and...
 
Identity and o365 on Azure
Identity and o365 on AzureIdentity and o365 on Azure
Identity and o365 on Azure
 
Amazon Cognito Deep Dive
Amazon Cognito Deep DiveAmazon Cognito Deep Dive
Amazon Cognito Deep Dive
 
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...
 
Get your Hybrid Identity in 4 steps with Azure AD Connect
Get your Hybrid Identity in 4 steps with Azure AD ConnectGet your Hybrid Identity in 4 steps with Azure AD Connect
Get your Hybrid Identity in 4 steps with Azure AD Connect
 
What's new in Azure Active Directory and what's coming new ?
What's new in Azure Active Directory and what's coming new ?What's new in Azure Active Directory and what's coming new ?
What's new in Azure Active Directory and what's coming new ?
 
Azure Active Directory - An Introduction for Developers
Azure Active Directory - An Introduction for DevelopersAzure Active Directory - An Introduction for Developers
Azure Active Directory - An Introduction for Developers
 
Developing Apps with Azure AD
Developing Apps with Azure ADDeveloping Apps with Azure AD
Developing Apps with Azure AD
 
IAM Best Practices
IAM Best PracticesIAM Best Practices
IAM Best Practices
 
Azure Active Directory - An Introduction
Azure Active Directory  - An IntroductionAzure Active Directory  - An Introduction
Azure Active Directory - An Introduction
 

En vedette

Single sign on using WSO2 identity server
Single sign on using WSO2 identity serverSingle sign on using WSO2 identity server
Single sign on using WSO2 identity server
WSO2
 

En vedette (10)

Single sign on using WSO2 identity server
Single sign on using WSO2 identity serverSingle sign on using WSO2 identity server
Single sign on using WSO2 identity server
 
Elastic Connectivity - Session Sponsored by Megaport
Elastic Connectivity - Session Sponsored by Megaport Elastic Connectivity - Session Sponsored by Megaport
Elastic Connectivity - Session Sponsored by Megaport
 
Hadoop 101
Hadoop 101Hadoop 101
Hadoop 101
 
Integrate Social Login Into Mobile Apps (SEC401) | AWS re:Invent 2013
Integrate Social Login Into Mobile Apps (SEC401) | AWS re:Invent 2013Integrate Social Login Into Mobile Apps (SEC401) | AWS re:Invent 2013
Integrate Social Login Into Mobile Apps (SEC401) | AWS re:Invent 2013
 
Federation
FederationFederation
Federation
 
Big Data Use Cases and Solutions in the AWS Cloud
Big Data Use Cases and Solutions in the AWS CloudBig Data Use Cases and Solutions in the AWS Cloud
Big Data Use Cases and Solutions in the AWS Cloud
 
AWS Webcast - How to Architect and Deploy a Multi-Tier SharePoint Server Farm...
AWS Webcast - How to Architect and Deploy a Multi-Tier SharePoint Server Farm...AWS Webcast - How to Architect and Deploy a Multi-Tier SharePoint Server Farm...
AWS Webcast - How to Architect and Deploy a Multi-Tier SharePoint Server Farm...
 
AWS 101: Introduction to AWS
AWS 101: Introduction to AWSAWS 101: Introduction to AWS
AWS 101: Introduction to AWS
 
Introduction to Amazon Web Services
Introduction to Amazon Web ServicesIntroduction to Amazon Web Services
Introduction to Amazon Web Services
 
Hadoop Overview & Architecture
Hadoop Overview & Architecture  Hadoop Overview & Architecture
Hadoop Overview & Architecture
 

Similaire à AWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-On

AWS Identity and access management for users
AWS Identity and access management for usersAWS Identity and access management for users
AWS Identity and access management for users
StephenEfange3
 

Similaire à AWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-On (20)

SID201 Overview of AWS Identity, Directory, and Access Services
 SID201 Overview of AWS Identity, Directory, and Access Services SID201 Overview of AWS Identity, Directory, and Access Services
SID201 Overview of AWS Identity, Directory, and Access Services
 
AWS Identity, Directory, and Access Services: An Overview
AWS Identity, Directory, and Access Services: An Overview AWS Identity, Directory, and Access Services: An Overview
AWS Identity, Directory, and Access Services: An Overview
 
Demystifying identity on AWS
Demystifying identity on AWSDemystifying identity on AWS
Demystifying identity on AWS
 
IAM Introduction
IAM IntroductionIAM Introduction
IAM Introduction
 
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
 
Introduction to Identity and Access Management (IAM)
Introduction to Identity and Access Management (IAM)Introduction to Identity and Access Management (IAM)
Introduction to Identity and Access Management (IAM)
 
AWS IAM Introduction
AWS IAM IntroductionAWS IAM Introduction
AWS IAM Introduction
 
How You Can Use AWS Identity Services to Be Successful on Your AWS Cloud Journey
How You Can Use AWS Identity Services to Be Successful on Your AWS Cloud JourneyHow You Can Use AWS Identity Services to Be Successful on Your AWS Cloud Journey
How You Can Use AWS Identity Services to Be Successful on Your AWS Cloud Journey
 
Delegating Access to your AWS Environment (SEC303) | AWS re:Invent 2013
Delegating Access to your AWS Environment (SEC303) | AWS re:Invent 2013Delegating Access to your AWS Environment (SEC303) | AWS re:Invent 2013
Delegating Access to your AWS Environment (SEC303) | AWS re:Invent 2013
 
AWS Users Authentication
AWS Users AuthenticationAWS Users Authentication
AWS Users Authentication
 
AWS Identity and access management for users
AWS Identity and access management for usersAWS Identity and access management for users
AWS Identity and access management for users
 
Identify and Access Management: The First Step in AWS Security
Identify and Access Management: The First Step in AWS SecurityIdentify and Access Management: The First Step in AWS Security
Identify and Access Management: The First Step in AWS Security
 
Security Best Practices - Hebrew Webinar
Security Best Practices - Hebrew WebinarSecurity Best Practices - Hebrew Webinar
Security Best Practices - Hebrew Webinar
 
(SEC307) A Progressive Journey Through AWS IAM Federation Options
(SEC307) A Progressive Journey Through AWS IAM Federation Options(SEC307) A Progressive Journey Through AWS IAM Federation Options
(SEC307) A Progressive Journey Through AWS IAM Federation Options
 
Best Practices for Security at Scale
Best Practices for Security at ScaleBest Practices for Security at Scale
Best Practices for Security at Scale
 
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
 
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
 
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdf
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdfJeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdf
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdf
 
AWSM2C3.pptx
AWSM2C3.pptxAWSM2C3.pptx
AWSM2C3.pptx
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
 

Plus de Amazon Web Services

Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 

Plus de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

AWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-On

  • 1. Get Closer to the Cloud with Federated Single Sign-On
  • 2. Welcome Maya Cabassi Partner Marketing Manager Amazon Web Services
  • 3. Webinar Overview  Submit Your Questions using the Q&A tool.  A copy of today’s presentation will be made available on:  AWS SlideShare Channel@ http://www.slideshare.net/AmazonWebServices/  AWS Webinar Channel on YouTube@ http://www.youtube.com/channel/UCT- nPlVzJI-ccQXlxjSvJmw
  • 4. Ben Brauer Sn. Product Manager Amazon Web Services Introducing Mark Diodati Technical Dir. Office of the CTO Ping Identity
  • 5.  Overview of AWS Identity Access Management (IAM)  How to deploy Ping Identity Federated Single Sign- On in AWS  Q&A What We’ll Cover
  • 6. IAM is about Access Control • One of customers’ top considerations when moving to the cloud CONTROL • Why do we want control? – Appropriate access to do appropriate actions – I want to implement security best practices – I want to be at least as secure as on premise – I must comply with certain industry specific security regulations
  • 7. IAM Concepts in AWS • Create and Manage Users and Groups • Security – Multiple users, with individual permissions – Individual security credentials (access keys, password, MFA) – Secure by default • Control – Centralized control of user access – Fine-grained permissions – Control Users’ access to APIs and AWS Console – Cross-account access • Integrated – No changes to service APIs – Federated
  • 8. Identity Management Concepts IAM Users: administrators and consumers of AWS services and resources Groups: a collection of IAM users and policy that applies to all the IAM users in the group Examples Bob can log into the AWS Management Console to administer his company’s account IAM users in the developers group are allowed to access EC2 instances tagged with development, but are not allowed to access instances tagged with production Managed Entities
  • 9. Identity and Access Management Who has access? What can they do? IAM Users/Groups Access Policies Authentication Authorization
  • 10. What is Identity Federation? Who has access? AWS + Partner Solutions Within AWS IAM Users Identity Management Solutions External User Authentication
  • 11. Benefits of Identity Federation • Eliminate managing duplicate user identities • End users do not need yet another password to remember • Leverage your existing investment in identity management solutions • Re-use your internal identity management processes (e.g., password length, rotation, etc…)
  • 12. Identity Management Concepts in AWS IAM Users: administrators and consumers of AWS services and resources Groups: a collection of IAM users and policy that applies to all the IAM users in the group IAM Roles: grants a trusted party temporary access to your AWS account Examples Bob can log into the AWS Management Console to administer his company’s account IAM users in the developers group are allowed to access EC2 instances tagged with development, but are not allowed to access instances tagged with production Managed Entities Grant access to an identity provider to enable federated users access to the AWS Management Console.
  • 13. Identity Federation Example Log into the AWS console without a username and password! Active Directory
  • 14. AWS AND FEDERATION Integrating AWS with External Identity Systems
  • 15. 15 IaaS and PaaS need love, too deployments number of users
  • 16. increased IAM needs deployments users more administrators more end-user services organizational confidence more services
  • 17. 17 say wha? federation is an interoperable technology provides single sign-on across security domains uses security assertion markup language (SAML)
  • 18. 18 say wha? federation identity provider (IDP) authenticates users gives users SSO (SAML) credentials redirects users to federation SP
  • 19. 19 say wha? federation service provider (SP) accepts user’s SAML credentials creates user credentials for the local application
  • 20. 20 federation in action hosted on-premises federation IDP SaaS application federation SP SSO (SAML) LDAP
  • 21. 21 use cases 1) AWS IAM as federation SP (new!) accepts user’s SAML credentials creates AWS user credentials for access to services 2) federation IDP runs in EC2 instance authenticates users, gives SAML credentials 3) federation IDP runs in EC2 instance accepts SAML credentials, creates local credentials
  • 22. 22 federation: interfacing with AWS default possible
  • 23. 23 Good Ole Days hosted on-premises custom code storage of IAM user keys storage of federated user keys proprietary connectionAmazonAPI LDAP (mostly) non-web interaction
  • 24. 24 1) AWS as federation SP hosted on-premises commercial federation IDP no storage of IAM user keys no storage of federated user keys security token service resides in AWS SSO (SAML) LDAP (mostly) web interaction
  • 25. 25 AWS federation SAML attributes Name Description SAML subject name “uid=tstark,ou=people,o=cloudidentity.com” Role concatenation of two attributes • Amazon Resource Name (ARN) of the AWS role with the entitlements for the federated user • ARN of the AWS role with entitlements for the identity provider “arn:aws:iam::012323142877:role/S3-Users, arn:aws:iam::012323142877:saml-provider/PING-IDP” Role Session Name Enables user-specific access policies for the federated user “tstark”
  • 26. 26 2) EC2 instance with federation IDP hosted on-premises ec2 instance IDP application authentication partner
  • 27. 27 3) EC2 instance with federation SP hosted on-premises SP (with app) federation IDP ec2 instance
  • 28. recommendations • understand your AWS access requirements – Non-web access may be a challenge using federation technology • don’t use the AWS (superuser) account for the IDP user – Otherwise, privilege and catastrophe awaits you • carefully scope the access rights for your roles – IAM IDP user role – federated user role 28
  • 30. A Look Ahead: Cloud Identity Summit www.cloudidentitysummit.com 30 Jim Scharf: Identity Management for the Cloud Ben Brauer: Securing your AWS Environment Shon Shah: Delegating Access to your AWS Environment Conor Cahill: Federating Access to your AWS Environment
  • 31. What We’ll Cover Contacts: Ping Identity: https://www.pingidentity.com/ AWS: aws.amazon.com/contact-us
  • 32. We appreciate your feedback on this presentation. Please take a moment for a quick survey.